Alberts, D.S., Garstka, J.J., Stein, F.P.: Network centric warfare: Developing and leveraging information superiority (1998)
Google Scholar
VMware Technology Network Blog. Introducing VProbes: a stethoscope for your VM (June 2008),
http://blogs.vmware.com/vmtn/2008/06/introducing-vpr.html
Boyd, J.R.: A discourse on winning and losing. Maxwell Air Force Base, AL: Air University. Library Document No. M-U 43947, Briefing slides (1987)
Google Scholar
Chen, L., Avizienis, A.: N-version programming: A fault-tolerance approach to reliability of software operation. In: International Symposium on Fault-Tolerant Computing, FTCS (1978)
Google Scholar
Coakley, T.: Decision superiority. Air & Space Power Journal (May 2001)
Google Scholar
Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. In: USENIX Security Symposium (2003)
Google Scholar
National Vulnerability Database. Vulnerability summary for CVE-2003-0244,
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0244
Endsley, M.R.: Toward a theory of situation awareness in dynamic systems. Human Factors 37(1), 32–64 (1995)
CrossRef
Google Scholar
Keromytis, A.D.: Characterizing self-healing software systems. In: Proceedings of the 4th International Conference on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS) (2007)
Google Scholar
MIT Lincoln Laboratory. Air and missle defense technology principal accomplishments (2008),
http://www.ll.mit.edu/mission/airmissile/airmissileaccomplishments.html
Lee, D., Lee, J., Lee, K.H.: A decision-support system to improve damage survivability of submarine. In: Hendtlass, T., Ali, M. (eds.) IEA/AIE 2002. LNCS (LNAI), vol. 2358, pp. 61–78. Springer, Heidelberg (2002)
Google Scholar
Lipson, H.F., Fisher, D.A.: Survivability—a new technical and business perspective on security. In: NSPW 1999: Proceedings of the 1999 workshop on New security paradigms, pp. 33–39. ACM, New York (2000)
CrossRef
Google Scholar
United States Department of Defense. The implementation of network-centric warfare. United States Government Printing Office (January 2005)
Google Scholar
United States Department of Defense. FY2009–2034 Unmanned systems integrated roadmap (2009),
http://www.acq.osd.mil/uas/
United States Joint Chiefs of Staff. Joint publication 3-13: Information operations (February 2006),
http://www.dtic.mil/doctrine
United States National Institute of Standards (NIST). Guide to intrusion detection and prevention systems (IDPS) (Special publication 800-94) (February 2007)
Google Scholar
Schwaegerl, C., Seifert, O., Buschmann, R., Dellwing, H., Geretshuber, S., Leick, C.: Increase of power system survivability with the decision support tool CRIPS based on network planning and simulation program PSS®SINCAL. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 119–130. Springer, Heidelberg (2009)
CrossRef
Google Scholar
Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a reactive immune system for software services. In: In Proceedings of the USENIX Annual Technical Conference, pp. 149–161 (2004)
Google Scholar
United States. Information operations [electronic resource]. U.S. Air Force, Washington, D.C (2005)
Google Scholar
Weimer, F.: Algorithmic complexity attacks and the linux networking code (May 2003),
http://www.enyo.de/fw/security/notes/linux-dst-cache-dos.html